The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security
The Turonian-Lower Companian succession at Majnoon Oil Field is represented by the Khasib, Tanuma, and Saadi formations. Four major paleoenvironments were recognized within the studied succession, there are: Shallow open marine environment, shoal environment, deep marine environment, and basinal environment. They reflect deposition on a carbonate platform of homoclinal ramp setting. The studied succession represents two second order supersequences (A) and (B). Supersequence (A) includes both the Khasib and Tanuma formations. The Saadi Formation represents cycle (B). These second order cycles can be divided each into two third order cycles, This subdivision may reflect the effect of eustacy being the major controlling factor of cycles dev
... Show MoreBackground: Dental erosion is a common oral condition which results due to consumption of high caloric and low pH acidic food such as carbonated drinks and fruit juices. It is expected that these food types can cause irreversible damage to dental hard tissues and early deterioration of the dental restorations. So, this study aimed to evaluate and compare the erosive potential effects of orange fruit juice and Miranda orange drink on the microhardness of an orthodontic composite material. Materials and methods: Thirty discs with a thickness of 2 mm and a diameter of 10 mm were prepared from orthodontic bonding composite. The prepared discs were equally divided into three groups (n=10). Microhardness analysis was carried out both prior to
... Show MoreSea level rise (SLR) due to climate change is affecting the coastline, causing shoreline changes, the degradation of mangrove forests, and the destruction of coastal resources. This is the cause of a huge amount of mangrove degradation in many parts of the Ganges–Brahmaputra–Meghna delta. A total of 90% of people have been forced to migrate from the island due to extreme weather conditions. In this study, remote sensing (RS) and geographic information system (GIS) techniques were used for LULC change and shoreline shift analyses of Ghoramara Island. LULC classification was carried out using thirty years of Landsat datasets with intervals of ten years (1990 and 2000) and intervals of five years (2005, 2010, 2015, and 2020). The classific
... Show More
For criminal investigations, fingerprints remain the most reliable form of personal identification despite developments in other fields like DNA profiling. The objective of this work is to compare the performance of both commercial charcoal and activated carbon powder derived from the Alhagi plant to reveal latent fingerprints from different non-porous surfaces (cardboard, plain glass, aluminum foil sheet, China Dish, Plastic, and Switch). The effect of three variables on activated carbon production was investigated. These variables were the impregnation ratio (the weight ratio of KOH: dried raw material), the activation temperature, and the activation time. The effect factors were investigated using Central Composite Design
... Show MoreWe study the physics of flow due to the interaction between a viscous dipole and boundaries that permit slip. This includes partial and free slip, and interactions near corners. The problem is investigated by using a two relaxation time lattice Boltzmann equation with moment-based boundary conditions. Navier-slip conditions, which involve gradients of the velocity, are formulated and applied locally. The implementation of free-slip conditions with the moment-based approach is discussed. Collision angles of 0°, 30°, and 45° are investigated. Stable simulations are shown for Reynolds numbers between 625 and 10 000 and various slip lengths. Vorticity generation on the wall is shown to be affected by slip length, angle of incidence,
... Show MoreThis research investigated the importance and priorities of the project overhead costs in Iraq via a questionnaire using the fuzzy analytic hierarchy process technique (FAHP). Using this technique is very important in the uncertain circumstances as in our country. The researcher reached to frame an equation through the results of the priorities of weights include the percentages of each of the main items of the project overhead costs. The researcher tested this equation by applying it to one of the completed projects and the results showed suitability for the application. The percentages of the (salaries, grants, and incentives) and (fieldwork requirements) in equation represent approximately two-thirds of project overhe
... Show MoreThe investigation of determining solutions for the Diophantine equation over the Gaussian integer ring for the specific case of is discussed. The discussion includes various preliminary results later used to build the resolvent theory of the Diophantine equation studied. Our findings show the existence of infinitely many solutions. Since the analytical method used here is based on simple algebraic properties, it can be easily generalized to study the behavior and the conditions for the existence of solutions to other Diophantine equations, allowing a deeper understanding, even when no general solution is known.
The research aims to measure the psychological security of social working in the courts, to measure the motivation of achievement for social researchers working in the courts. In addition to, identify the Psychological security and its relation to the motivation of achievement for social researchers working in the courts. To achieve these aims, the researcher adopted two scales: Maslow scale for Psychological security, which was translated to Arabic by Dwany and Dirany 1983 consisted of (75) items. The second scale is Othman scale for achievement motivation 2014 consisted of (24) items. The two scales had been applied to a sample consisted of (100) social researchers working in the courts of Baghdad with its two branches Al-karkh and Al-
... Show More